US20200320193A1 - Baseboard management controller to perform security action based on digital signature comparison in response to trigger - Google Patents

Baseboard management controller to perform security action based on digital signature comparison in response to trigger Download PDF

Info

Publication number
US20200320193A1
US20200320193A1 US16/904,045 US202016904045A US2020320193A1 US 20200320193 A1 US20200320193 A1 US 20200320193A1 US 202016904045 A US202016904045 A US 202016904045A US 2020320193 A1 US2020320193 A1 US 2020320193A1
Authority
US
United States
Prior art keywords
computing device
digital signature
management controller
hardware devices
baseboard management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US16/904,045
Inventor
Suhas SHIVANNA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Enterprise Development LP
Original Assignee
Hewlett Packard Enterprise Development LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development LP filed Critical Hewlett Packard Enterprise Development LP
Priority to US16/904,045 priority Critical patent/US20200320193A1/en
Assigned to HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP reassignment HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHIVANNA, SUHAS
Publication of US20200320193A1 publication Critical patent/US20200320193A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping

Definitions

  • a data center is a facility used to house computer networks, computer systems, and associated components, such as telecommunications and storage systems. Datacenters, offices, etc. can be end locations for computing devices manufactured by a manufacturer. Computing devices may be attacked via physical means at its endpoint, e.g., a datacenter, or in transit.
  • FIGS. 1 and 2 are block diagrams of computing devices capable of comparing digital signatures of hardware devices to perform a security action, according to various examples
  • FIG. 4 is a block diagram of a device with a baseboard management controller capable of executing a method to perform a security action based on a comparison of digital signatures of hardware devices of a device, according to an example.
  • a data center is a facility used to house computer networks, computer systems, and associated components, such as telecommunications and storage systems. Datacenters, offices, warehouses, etc. can be end locations for computing devices provided by a manufacturer. Computing devices may be attacked at its endpoint, e.g., a datacenter, or in transit.
  • approaches described herein relate to an advanced physical intrusion detection solution that helps to detect physical attacks on a computing device with or without an intrusion detection latch to detect supply chain and production mode physical attacks intended to modify hardware, firmware and/or configuration of the computing device.
  • the approach can use a digital signature, configurable system modes, embedded intrusion detection analysis, a trusted cloud service to detect physical intrusions, combinations thereof, etc. to provide smart alerts (e.g., intrusion alerts) and provide physical security confidence for the computing device.
  • the computing device creates a digital signature of a data block containing the hardware, firmware, and configuration inventory and stores the digital signature in a secure area when an intrusion detection mode is implemented, for example, as a step of the manufacturing process or enabled as part of a user instruction.
  • the computing devices can support being shipped with an intrusion detection mode (e.g., a supply chain or production mode) to allow detection of physical intrusions when chassis open event is detected using the physical intrusion detection latch or an analysis of computing device and provide a particular security action based on the mode.
  • an intrusion detection mode e.g., a supply chain or production mode
  • the configuration of a server to intrusion detection monitoring mode can be a step in the manufacturing process at which point a digital signature of hardware (e.g. memory modules such as dual inline memory modules (DIMMs), hardware types, serial numbers, Input Output (IO) card inventory, storage card inventory, etc.), and associated firmware inventory and/or settings can be calculated and written into a protected non-volatile storage.
  • hardware e.g. memory modules such as dual inline memory modules (DIMMs), hardware types, serial numbers, Input Output (IO) card inventory, storage card inventory, etc.
  • firmware inventory and/or settings can be calculated and written into a protected non-volatile storage.
  • a backup of the digital signature and a value of the digital signature for the unique serial number identifying the computing device can be maintained in a remote server associated with the manufacturer (e.g., as a cloud service).
  • the cloud service can allow authorized users to retrieve the stored digital signature. For example, if the computing device is locked down during the intrusion detection mode, the cloud service (e.g., implemented via a remote server) can be used to unlock the computing device.
  • the digital signature can be used to derive a password to unlock the computing device.
  • the digital signature is saved in the cloud service to allow for recovery.
  • the lockdown mode can be activated and a digital signature taken.
  • the digital signature can be used to lock the computing device (e.g., as a parameter in a token or password generated using a cryptographic suite).
  • the digital signature can be sent to the remote server and/or stored in a secure location of the computing device.
  • the computing device can then be shipped or otherwise set up by the user.
  • the password or other authentication can be requested.
  • the password or other authentication can be based on logging into an account on the remote server to obtain the password or token generated to unlock the computing device.
  • a BMC can implement a challenge/response protocol before continuing with the normal boot of the computing device. This mode can be used, for example, when the computing device is being moved or stored.
  • the response for the challenge from the BMC could be the retrieved by users via a cloud service that ties the computing device to an owner account.
  • the BMC can verify the configuration (e.g., hardware, firmware and associated configuration) to be the same as the digital signature and will bring the system out of the configured heightened response mode and proceed with the normal operation.
  • the computing device when the intrusion detection mode is enabled, the computing device will record each of the boot operations and the corresponding digital signature at each boot in a non-volatile memory.
  • the non-volatile memory can be protected (e.g., via access limitations restricted to a baseboard management controller (BMC)).
  • BMC baseboard management controller
  • the digital signature can be collected at other times via a BMC using out of band management.
  • management firmware of a computing device with physical intrusion detection locks can automatically trigger a configuration compare analysis when a chassis open condition is detected by the intrusion detection latch.
  • a trigger can occur if the time of the computing device is changed or time is invalid after a system boot (e.g., reflecting attacks that remove the battery to reset an intrusion detection latch condition).
  • a security action can include a deep configuration compare of the computing device.
  • the deep configuration compare can be performed using an inventory from a current installed hardware and the stored signature at the time of the initiation of the intrusion detection mode.
  • a particular security response can be taken.
  • the computing device can log/alert to indicate potential breach with details of the missing part and/or the details of the exact configuration change that was detected within the computing device.
  • the logs/alerts can also specify how many reboots have happened in the computing device using the digital signature history from the time of activation of the intrusion detection mode.
  • the computing device can be configured to a production mode with the intrusion detection mode enabled.
  • the BMC can provide an option to put a computing device into a mode to activate physical intrusion analysis based on certain triggers.
  • the triggers can include a power on event, a system reboot event, a chassis removed event generated by a physical intrusion detected latch, etc.
  • the turning on the intrusion detection mode for the computing device in production can be protected by authentication and authorization including the use of multi-factor authentication.
  • a security officer or other user can enable the mode, for example, using a BMC interface, another firmware interface, etc.
  • the BMC can compute the current digital signature of the hardware, firmware, configuration information, combinations thereof, etc. and store the digital signature in a non-volatile storage. In some examples, other details can be stored as well, for example, time of activation.
  • the BMC can be configured to store the digital signature of the configuration data and inventory signature.
  • a response in the challenge response protocol can be derived from the inventory signature encrypted by a key.
  • the user can configure the action to be taken by the BMC when an intrusion is detected with the system in the intrusion detection mode.
  • An example action that can be configured includes putting the computing device into a contained mode based on the detected state change and/or sending alerts to preconfigured destinations or shutting down the server.
  • a security officer is required to intervene and respond to the challenge response protocol of the BMC.
  • Other security actions can include the determination of a missing part that caused a change between signatures or the details of the exact configuration change that was detected within the computing device.
  • a configuration compare can also consider the health of the computing device during configuration compare to detect chassis opening events that may involve repair by reinserting loose devices.
  • the logs/alerts can also specify the number of reboots from the activation of the intrusion detection mode and the time between the server switch off operation and next reboot, which may indicate abnormal behavior if repairs are carried with server in intrusion detection mode.
  • the BMC may still send a warning security alert whenever it detects an opening of the chassis to capture maintenance operation state that involve hardware replacement/removal.
  • FIGS. 1 and 2 are block diagrams of computing devices capable of comparing digital signatures of hardware devices to perform a security action, according to various examples.
  • Computing device 100 includes a system board 110 , a baseboard management controller 112 , a digital signature 114 , configuration settings 116 , at least one central processing unit 130 , and a memory module 132 .
  • Computing device 200 also includes a latch trigger mechanism 220 , health information 222 , a field replaceable unit 224 , a bus 240 with one or more bus devices 242 , a controller hub 252 , and one or more application specific integrated circuit (ASIC) 254 .
  • ASIC application specific integrated circuit
  • the BMC 112 can be used to implement services for the computing device 100 , 200 .
  • BMC 112 can be implemented using a separate processor from the central processing unit(s) (CPUs) 130 that is used to execute a high level operating system.
  • BMCs can provide so-called “lights-out” functionality for computing devices. The lights out functionality may allow a user, such as a systems administrator, to perform management operations on the computing device 100 , 200 even if an operating system is not installed or not functional on the computing device 100 , 200 .
  • the BMC 112 can run on auxiliary power, thus the computing device 100 , 200 need not be powered on to an on state where control of the computing device 100 , 200 is handed over to an operating system after boot.
  • the BMC 112 may provide so-called “out-of-band” services, such as remote console access, remote reboot and power management functionality, monitoring health of the system, access to system logs, and the like.
  • a BMC 112 has management capabilities for sub-systems of a computing device 100 , 200 , and is separate from the CPU 130 that executes a main operating system of a computing device (e.g., a server or set of servers).
  • the BMC 112 may enable lights-out management of the computing device 100 , 200 , which provides remote management access (e.g., system console access) regardless of whether the computing device 100 , 200 is powered on, whether a primary network subsystem hardware is functioning, or whether an OS is operating or even installed.
  • the BMC 112 may comprise an interface, such as a network interface, and/or serial interface that an administrator can use to remotely communicate with the BMC 112 .
  • an “out-of-band” service is a service provided by the BMC 112 via a dedicated management channel (e.g., the network interface or serial interface) and is available whether the computing device 100 , 200 is in powered on state.
  • a BMC 112 may be included as part of an enclosure. In other examples, a BMC 112 may be included in one or more of the servers (e.g., as part of the management subsystem of the server) or connected via an interface (e.g., a peripheral interface). In some examples, sensors associated with the BMC 112 can measure internal physical variables such as humidity, temperature, power supply voltage, communications parameters, fan speeds, operating system functions, or the like. In other examples, the BMC 112 can collect and store log information, for example, log information associated with health of the computing device 100 . The BMC 112 may also be capable to reboot or power cycle the device. As noted, the BMC 112 allows for remote management of the device, as such, notifications can be made to a centralized station using the BMC 112 and passwords or other user entry can be implemented via the BMC 112 .
  • the Operating System is a system software that manages computer hardware and software resources and provides common services for computer programs.
  • the OS can be executable on CPU 130 and loaded to memory modules 132 .
  • the OS is a high level OS such as LINUX, WINDOWS, UNIX, a bare metal hypervisor, or other similar high level software that a boot firmware engine of the computing device 100 , 200 turns control of the computing device 100 , 200 to.
  • an entity initiates putting the computing device 100 , 200 into an intrusion detection mode in which an inventory of the computer system is taken by the BMC 112 to create a digital signature.
  • the BMC 112 can activate the intrusion detection mode.
  • a first digital signature is calculated of the hardware devices, one or more configuration settings 116 of the computing device 100 , 200 , at least one firmware version of firmware of the computing device 100 , 200 , combinations thereof, etc.
  • the system board 110 is the main printed circuit board used for the computing device 100 , 200 and allows communication between many of the components of the computing device, for example, the CPU 130 , the memory module 132 , peripherals, bus devices 242 , etc.
  • a number of hardware devices can be coupled to the system board 110 .
  • a controller hub 252 can be an I/O controller hub, for example a southbridge. The controller hub may be used to manage data communications between a CPU 130 and other components of the system board 110 .
  • a controller hub 252 may have direct media interface to a northbridge device or the CPU.
  • controller hub 252 may provide peripheral support for the computing device 200 , such as bus connections like Universal Serial Bus (USB), Peripheral Component Interconnect (PCI), PCI express, PCI extended, serial AT attachment, audio circuitry, integrated Ethernet, enhanced host controller interfaces, combinations thereof, etc.
  • USB Universal Serial Bus
  • PCI Peripheral Component Interconnect
  • PCI express Peripheral Component Interconnect Express
  • PCI extended PCI extended
  • serial AT attachment PCI extended
  • audio circuitry integrated Ethernet
  • enhanced host controller interfaces combinations thereof, etc.
  • Examples of devices or components of the computing device 200 include bus devices 242 on one or multiple bus 240 (e.g., a PCIe bus), field replaceable units, a northbridge device, other ASICs 254 , etc.
  • a field replaceable unit is a circuit board, part, or assembly that can be easily removed from a computing device 200 and replaced by a user or technician without having to send the whole computing device to a repair facility.
  • Examples of FRUs include parts that can attach to other parts of the computing device 200 using a socket, a card, a module, etc. Further, examples of FRUs can include computing modules, memory modules, peripheral cards and devices, etc.
  • system logs can include registers that provide particular information (e.g., an error flag for a particular component, a type of error, a current configuration, a location associated with an error, etc.).
  • FRUs may include one or multiple unique identifiers (e.g., a serial number).
  • a memory module 132 is a component that can store information.
  • the memory module 132 can be volatile or non-volatile. Further, the memory module 132 may be addressable by a central processing unit 130 of the computing device 100 , 200 .
  • An example of a memory module 132 includes a DIMM.
  • the BMC 112 can interrogate (e.g., send a query and receive a response) to and from each of the components (e.g., hardware devices, firmware versions, configuration settings, etc.) to be inventoried. This may be performed by a particular sequence to ensure that each hardware device is detected and inventoried.
  • one or more bus 240 on the computing device 100 , 200 can be searched for components and then the components can be inventoried.
  • a bus 240 is a communication system that transfers data between components inside the computing device 100 , 200 .
  • Buses can include a PCIe bus, a memory bus, a universal serial bus, etc.
  • microcontrollers or firmware can be used to detect and inventory hardware devices coupled to the computing device 200 .
  • the BMC 112 can request part or all of the inventory to be taken by the BIOS or other controller.
  • a bus device 242 can be included in a bus 240 .
  • a peripheral device is a component that is not part of the essential computer (e.g., a main memory or central processing unit).
  • An example of a peripheral device on a bus is a PCIe integrated network card or a PCIe graphics accelerator.
  • the BMC 112 is not directly connected to the hardware device to be interrogated and another component (e.g., the controller hub 252 ) and/or one or more bus can act as an intermediary between the BMC 112 and the hardware devices.
  • the configuration settings can include values for all security settings, hardware enabled, hardware speed settings, voltage settings, license settings, etc.
  • the configuration settings inventoried can include a subset of configuration settings 116 that would normally not change between boots or with usage.
  • the inventory may also include at least one firmware version identifier for one or multiple firmware implemented on the computing device 200 .
  • a firmware version identifier can be an identifier of a version of the firmware being implemented on a particular component or a digital signature of an installed and approved firmware. This can protect from a malicious entity attempting to downgrade firmware to circumvent protections.
  • the inventory can include one or more unique identifiers (e.g., serial numbers) of the respective components. In other examples, the inventory can include other static information about the component.
  • a data structure can be used to incorporate the inventory.
  • the first digital signature can be created for the inventory that is taken.
  • a digital signature is a mathematical approach for demonstrating the authenticity of a digital message or document (e.g., the inventory).
  • a modern cryptographic protocol suite can be used to calculate the signature from the inventory.
  • the BMC 112 can cause storage of the digital signature. Further, in some examples, the BMC 112 can cause storage of the inventory. The storage can be in a non-volatile memory. Thus, the BMC 112 can store the digital signature and/or inventory in a non-volatile memory.
  • the memory can be secure, for example, in a location only the BMC 112 can access, in a trusted platform module, or the like.
  • the digital signature and/or inventory can be stored on a remote server as well.
  • the information can be tied to a user account.
  • a unique identifier e.g., a serial number
  • the remote server can be a location that the BMC 112 stores the digital signature.
  • security actions can be configured and customized as further detailed below.
  • security action may be pre-determined, in other examples, the security action may be customized as part of the activation of the intrusion detection mode.
  • the BMC 112 can be set to monitor events that can help identify intrusions. Further, smart alerts can be sent to a user based on the monitoring.
  • the BMC 112 can record historical information, for example, take an inventory and store a digital signature on each boot of the computing device 200 .
  • the BMC 112 detects a trigger during monitoring.
  • the BMC 112 can react to a latch trigger mechanism 220 being triggered.
  • a latch trigger can include a switch or other circuit that can be triggered when the computing device is opened.
  • a custom intrusion trigger indicative of opening of the computing device 200 can be used.
  • the intrusion trigger can be a detection of an adverse time condition. For example, if a time value of the computing device 200 is reset or unexpectedly changes (e.g., because of removal of a battery), this can be a trigger indicative of a possible physical intrusion.
  • particular alterations to the configuration e.g., a missing or disabled FRU, particular security settings, etc.
  • a trigger can be periodic or in response to an event, such as boot of the system. Because the BMC 112 can operate even while the computing device 200 is not fully powered on, the process may be implemented out of band, for example, allowing for the system to power on but not boot past a certain level to enable searching for hardware and configuration changes, but not booting to an operating system.
  • the BMC 112 can calculate a second digital signature of currently detected hardware devices, configuration settings, and firmware.
  • the term “currently detected” refers to the hardware devices, configuration settings, and firmware detected on the computing device 200 in response to the trigger.
  • the approach used to search for the devices, configuration settings, and firmware versions that are detected can correspond to the approach above used for detecting hardware devices.
  • the BMC 112 can compare the first digital signature with the second digital signature. In one example, if the two digital signatures match, a first security action can be taken and if the signatures do not match a second security action can be taken.
  • the signatures match, which would indicate that there was an anomaly detected, but there is a high confidence that there was no change in the system.
  • a notification can be sent to a user (e.g., via a log message, an email, a management system, on screen, etc.) identifying the trigger and that there was no change found.
  • the signatures do not match.
  • a notification can be sent identifying the trigger and that there was a change.
  • the BMC 112 can further compare the inventories to determine a change between the two signatures. The change can be identified in the notification.
  • the change can occur in a FRU.
  • a priority can be associated with the notification.
  • health monitoring aspects of the BMC 112 can identify that there is an error condition associated with the FRU.
  • the BMC 112 can determine that the change included replacement of the FRU (e.g., identified by a change in serial number).
  • the priority of the notification sent can be determined based on the health status. For example, an unknown change or a change not related to a health status can have a higher alert priority than a replacement of a FRU what has a health issue (e.g., a logged error condition).
  • an amount of time that the computing device 200 was not in operation when the FRU was replaced can be used to adjust the priority.
  • acceptable maintenance time parameters can be kept in a data structure (e.g., a table). If the down time for the computing device 200 time parameters is not within the parameters, it can indicate that there was a possible malicious intrusion and the notification can be associated with a higher alert priority.
  • the BMC 112 can operate the intrusion detection mode in a lockdown mode.
  • a user In the lockdown mode, a user would be required to authenticate via a system to prove that the user have authorization to continue with a boot process for the computing device 200 when a comparison indicates that an intrusion occurred.
  • the user may be required to furnish a password or token via a remote server that had originally stored the first digital signature.
  • the password or token can be based on the first digital signature (e.g., derived from the first digital signature or used as a parameter for determining the password or token using a cryptographic suite).
  • the computing devices 100 , 200 can also include Input/Output interfaces, which may be used to communicate with other devices, for example, via a network, provide audible information, provide visual information, etc.
  • the input/output interfaces may also be used to implement other input/output, for example, storage functionality (e.g., access to one or multiple storage arrays).
  • the BMC 112 may be associated with a secure storage, a hardware root of trust, or other security features.
  • OS service operating system
  • provisioning engine in a factory, a unique private and public key are generated and ‘glued’ onto the system by being saved into the BMC storage. This storage can be persistent and not replaceable.
  • the BMC 112 may allow access to a key using an application programming interface. The values can be written to a write once register on a same Application Specific Integrated Circuit (ASIC) as the BMC. The write once register can be implemented, for example, using fuses.
  • ASIC Application Specific Integrated Circuit
  • the private key is created by executing an algorithm using random sources and is programmed.
  • the public key is a cryptographic hash of the private key.
  • the ability to change the registers is disabled (e.g., severing a fuseable link, for example, on a write line).
  • the BMC 112 can be used to ensure that firmware of the computing device 200 is secure (e.g., by ensuring that firmware is not updated unless it is signed or encrypted using a public key that the private key of the BMC 112 can decrypt. Further, in some examples, the BMC 112 can stop the computing device 200 from booting with compromised firmware.
  • the computing device 200 may include a processing element that may be one or multiple central processing unit (CPU) or a combination of a CPU and other components such as a graphics processing unit (GPU), or microprocessor suitable for retrieval and execution of instructions and/or electronic circuits configured to perform the functionality described herein.
  • a firmware engine corresponding to platform firmware such as a BIOS may be implemented as a series of instructions encoded on a machine-readable storage medium of computing device 100 , 200 and executable by CPU 130 .
  • a silicon root-of-trust feature supported by the computing device is used to ensure that the firmware on the computing device 100 , 200 is not compromised.
  • the silicon root-of-trust ensures that the BIOS and BMC Firmware cannot be replaced with non-authentic BIOS and BMC Firmware even with physical access to the system.
  • a communication network can use wired communications, wireless communications, or combinations thereof.
  • the communication network can include multiple sub communication networks such as data networks, wireless networks, telephony networks, etc.
  • Such networks can include, for example, a public data network such as the Internet, local area networks (LANs), wide area networks (WANs), metropolitan area networks (MANs), cable networks, fiber optic networks, combinations thereof, or the like.
  • LANs local area networks
  • WANs wide area networks
  • MANs metropolitan area networks
  • wireless networks may include cellular networks, satellite communications, wireless LANs, etc.
  • the communication network can be in the form of a direct network link between devices.
  • Various communications structures and infrastructure can be utilized to implement the communication network(s). Computing devices can connect to other devices using the communication network.
  • devices communicate with each other and other components with access to the communication network via a communication protocol or multiple protocols.
  • a protocol can be a set of rules that defines how nodes of the communication network interact with other nodes.
  • communications between network nodes can be implemented by exchanging discrete packets of data or sending messages. Packets can include header information associated with a protocol (e.g., information on the location of the network node(s) to contact) as well as payload information.
  • FIG. 3 is a flowchart of a method for performing a security action based on a comparison of digital signatures of hardware devices of a device, according to an example.
  • FIG. 4 is a block diagram of a device with a baseboard management controller capable of executing a method to perform a security action based on a comparison of digital signatures of hardware devices of a device, according to an example.
  • the device 400 includes, for example, a BMC 410 , and a machine-readable storage medium 420 including instructions 422 , 424 , 426 , 428 for performing a security action based on a comparison of inventories.
  • Device 400 may be, for example, a server, a notebook computer, a slate computing device, or any other computing device capable of performing the features described herein.
  • BMC 410 may be separate from a central processing unit (CPU) used to execute a high level OS of the device.
  • the BMC 410 can be a physical device.
  • BMC 410 may fetch, decode, and execute instructions 422 , 424 , 426 , 428 to implement method 300 .
  • BMC 410 may include at least one integrated circuit (IC), other control logic, other electronic circuits, or combinations thereof that include a number of electronic components for performing the functionality of instructions 422 , 424 , 426 , 428 .
  • IC integrated circuit
  • Machine-readable storage medium 420 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable instructions.
  • machine-readable storage medium may be, for example, Random Access Memory (RAM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a storage drive, non-volatile memory, a flash device, and the like.
  • RAM Random Access Memory
  • EEPROM Electrically Erasable Programmable Read-Only Memory
  • the machine-readable storage medium can be non-transitory.
  • machine-readable storage medium 420 may be encoded with a series of executable instructions for performing method 300 .
  • Method 300 may be implemented in the form of executable instructions stored on a machine-readable storage medium, such as storage medium 420 , and/or in the form of electronic circuitry.
  • the device 400 can be in a mode where it can take input.
  • the input can be used by the BMC 410 to activate an intrusion detection mode (e.g., a secure mode, a transit mode, a rest mode, etc.).
  • an intrusion detection mode e.g., a secure mode, a transit mode, a rest mode, etc.
  • BMC 410 can execute mode instructions 422 to enable the mode.
  • signature instructions 424 are executed to inventory the device 400 and calculate a digital signature as detailed above.
  • the device 400 can include a number of hardware devices coupled to a system board, for example, one or more memory module, one or more CPU, one or more FRUs, etc.
  • the inventory can be based on a number of unique identifiers associated with particular hardware devices of the device 400 , the system board, etc. For example, at least one unique identifier can be associated with each main memory module installed on the device, each processor installed on the device, the system board of the device, each of a number of bus devices in a bus of the device, combinations thereof, etc.
  • the inventory can be based on one or multiple configuration settings. Moreover, in some examples, version information about one or multiple firmware implemented on the device can be included in the inventory.
  • the digital signature is caused to be stored. In one example, the digital signature is stored in a non-volatile memory of the device. In another example, the digital signature can be caused to be stored in a remote server. As noted above, in some examples, the inventory can be stored as well.
  • the BMC 410 can be used to monitor the device to determine whether a trigger as described above occurs by executing trigger instructions 426 .
  • the BMC 410 calculates a second digital signature of the device 400 .
  • the second digital signature can be based on an inventory of the current hardware devices, configuration settings, and firmware versions of the device.
  • the inventory can include looking for the same information sought out in original process used to calculate the digital signature.
  • signature instructions 424 can be used to compare the first and second digital signature.
  • the first digital signature is locally stored, in others the first digital signature is stored at the remote server and retrieved.
  • the retrieval process can include signing into an account that is tied to the device.
  • security action instructions 428 can be executed to perform a security action based on the comparison.
  • the intrusion detection mode has a smart notification setting.
  • the inventory can also be compared.
  • the inventory comparison can determine a change in the computing device between the signatures.
  • the BMC 410 can output a notification (e.g., via a log, a display, an email, etc.) including information about the change.
  • the notification can be associated with a priority and the priority can be modified based on health information about the device and/or maintenance information associated with a replacement of an FRU.
  • the intrusion detection mode can implement a lockdown mode.
  • the trigger can be power on of the device 400 to a boot process.
  • the BMC 410 can authenticate a user to ensure that the user has authorization to continue to the boot process for the computing device when the comparison is indicative of an intrusion prior to allowing the device to boot to an operating system.
  • a remote server can store information to authenticate the user.
  • a user can have an account that is linked to the device. In one example, the link can occur or be confirmed at the time of activation of the intrusion detection mode.
  • a password or token from the account can be used to unlock the computing device and allow the boot process to complete and boot to the operating system.

Abstract

Examples disclosed herein relate to performing a security action based on a comparison of digital signatures. An intrusion detection mode is initiated by a baseboard management controller. A first digital signature of hardware devices is calculated during the activation of the intrusion detection mode. The first digital signature is stored. Upon detection of a trigger, a second digital signature is calculated for the current hardware devices. The digital signatures are compared. A security action is performed based on the comparison.

Description

    BACKGROUND
  • Service providers and manufacturers are challenged to deliver quality and value to consumers, for example by providing access to computing capabilities. A data center is a facility used to house computer networks, computer systems, and associated components, such as telecommunications and storage systems. Datacenters, offices, etc. can be end locations for computing devices manufactured by a manufacturer. Computing devices may be attacked via physical means at its endpoint, e.g., a datacenter, or in transit.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The following detailed description references the drawings, wherein:
  • FIGS. 1 and 2 are block diagrams of computing devices capable of comparing digital signatures of hardware devices to perform a security action, according to various examples;
  • FIG. 3 is a flowchart of a method for performing a security action based on a comparison of digital signatures of hardware devices of a device, according to an example; and
  • FIG. 4 is a block diagram of a device with a baseboard management controller capable of executing a method to perform a security action based on a comparison of digital signatures of hardware devices of a device, according to an example.
  • DETAILED DESCRIPTION
  • Service providers and manufacturers are challenged to deliver quality and value to consumers, for example by providing access to computing capabilities. A data center is a facility used to house computer networks, computer systems, and associated components, such as telecommunications and storage systems. Datacenters, offices, warehouses, etc. can be end locations for computing devices provided by a manufacturer. Computing devices may be attacked at its endpoint, e.g., a datacenter, or in transit.
  • Further, insider attacks can cause significant damage and is continuously increasing. Supply chain security concerns is a big issue with many users of computing devices looking for solutions that provide assurance that a computing device such as a server is not modified during transit after shipped from a secure manufacturing facility or at a site. Physical security also continues to be a concern in some segments and advanced physical attack intrusion solutions without compromising usability and flexibility can be beneficial.
  • Accordingly, approaches described herein relate to an advanced physical intrusion detection solution that helps to detect physical attacks on a computing device with or without an intrusion detection latch to detect supply chain and production mode physical attacks intended to modify hardware, firmware and/or configuration of the computing device. The approach can use a digital signature, configurable system modes, embedded intrusion detection analysis, a trusted cloud service to detect physical intrusions, combinations thereof, etc. to provide smart alerts (e.g., intrusion alerts) and provide physical security confidence for the computing device.
  • In one example, the computing device creates a digital signature of a data block containing the hardware, firmware, and configuration inventory and stores the digital signature in a secure area when an intrusion detection mode is implemented, for example, as a step of the manufacturing process or enabled as part of a user instruction. In one example, the computing devices can support being shipped with an intrusion detection mode (e.g., a supply chain or production mode) to allow detection of physical intrusions when chassis open event is detected using the physical intrusion detection latch or an analysis of computing device and provide a particular security action based on the mode.
  • As noted, in one example, the configuration of a server to intrusion detection monitoring mode can be a step in the manufacturing process at which point a digital signature of hardware (e.g. memory modules such as dual inline memory modules (DIMMs), hardware types, serial numbers, Input Output (IO) card inventory, storage card inventory, etc.), and associated firmware inventory and/or settings can be calculated and written into a protected non-volatile storage.
  • In some examples, a backup of the digital signature and a value of the digital signature for the unique serial number identifying the computing device can be maintained in a remote server associated with the manufacturer (e.g., as a cloud service). The cloud service can allow authorized users to retrieve the stored digital signature. For example, if the computing device is locked down during the intrusion detection mode, the cloud service (e.g., implemented via a remote server) can be used to unlock the computing device. In one example, the digital signature can be used to derive a password to unlock the computing device. In some examples, the digital signature is saved in the cloud service to allow for recovery.
  • Accordingly, in one example, the lockdown mode can be activated and a digital signature taken. The digital signature can be used to lock the computing device (e.g., as a parameter in a token or password generated using a cryptographic suite). The digital signature can be sent to the remote server and/or stored in a secure location of the computing device. The computing device can then be shipped or otherwise set up by the user. When the user starts the computing device, the password or other authentication can be requested. In one example, the password or other authentication can be based on logging into an account on the remote server to obtain the password or token generated to unlock the computing device.
  • In the example, if the computing device is configured for a heightened response or the lockdown mode, a BMC can implement a challenge/response protocol before continuing with the normal boot of the computing device. This mode can be used, for example, when the computing device is being moved or stored. The response for the challenge from the BMC could be the retrieved by users via a cloud service that ties the computing device to an owner account. Once the correct response is entered, the BMC can verify the configuration (e.g., hardware, firmware and associated configuration) to be the same as the digital signature and will bring the system out of the configured heightened response mode and proceed with the normal operation.
  • In one example, when the intrusion detection mode is enabled, the computing device will record each of the boot operations and the corresponding digital signature at each boot in a non-volatile memory. In some examples, the non-volatile memory can be protected (e.g., via access limitations restricted to a baseboard management controller (BMC)). In some examples, the digital signature can be collected at other times via a BMC using out of band management. In another example, management firmware of a computing device with physical intrusion detection locks can automatically trigger a configuration compare analysis when a chassis open condition is detected by the intrusion detection latch. In another example, a trigger can occur if the time of the computing device is changed or time is invalid after a system boot (e.g., reflecting attacks that remove the battery to reset an intrusion detection latch condition).
  • In a further example, when power is applied to a computing device and if a chassis open event is detected or another trigger condition is detected, the computing device can perform one of a number of security actions. In one example, a security action can include a deep configuration compare of the computing device. The deep configuration compare can be performed using an inventory from a current installed hardware and the stored signature at the time of the initiation of the intrusion detection mode. In one example, if there is a change in the signature and the system is in the intrusion detection mode, a particular security response can be taken. For example, the computing device can log/alert to indicate potential breach with details of the missing part and/or the details of the exact configuration change that was detected within the computing device. In some examples, the logs/alerts can also specify how many reboots have happened in the computing device using the digital signature history from the time of activation of the intrusion detection mode.
  • In another example, the computing device can be configured to a production mode with the intrusion detection mode enabled. In this mode, the BMC can provide an option to put a computing device into a mode to activate physical intrusion analysis based on certain triggers. In certain examples, the triggers can include a power on event, a system reboot event, a chassis removed event generated by a physical intrusion detected latch, etc. The turning on the intrusion detection mode for the computing device in production can be protected by authentication and authorization including the use of multi-factor authentication.
  • To enable the mode, a security officer or other user can enable the mode, for example, using a BMC interface, another firmware interface, etc. The BMC can compute the current digital signature of the hardware, firmware, configuration information, combinations thereof, etc. and store the digital signature in a non-volatile storage. In some examples, other details can be stored as well, for example, time of activation. In another example, the BMC can be configured to store the digital signature of the configuration data and inventory signature. In one example, a response in the challenge response protocol can be derived from the inventory signature encrypted by a key. In some examples, the user can configure the action to be taken by the BMC when an intrusion is detected with the system in the intrusion detection mode. An example action that can be configured includes putting the computing device into a contained mode based on the detected state change and/or sending alerts to preconfigured destinations or shutting down the server. In the contained mode, a security officer is required to intervene and respond to the challenge response protocol of the BMC.
  • Other security actions can include the determination of a missing part that caused a change between signatures or the details of the exact configuration change that was detected within the computing device. A configuration compare can also consider the health of the computing device during configuration compare to detect chassis opening events that may involve repair by reinserting loose devices.
  • The logs/alerts can also specify the number of reboots from the activation of the intrusion detection mode and the time between the server switch off operation and next reboot, which may indicate abnormal behavior if repairs are carried with server in intrusion detection mode. For systems with an intrusion detection hardware latch, when the intrusion detection mode is off, the BMC may still send a warning security alert whenever it detects an opening of the chassis to capture maintenance operation state that involve hardware replacement/removal.
  • FIGS. 1 and 2 are block diagrams of computing devices capable of comparing digital signatures of hardware devices to perform a security action, according to various examples. Computing device 100 includes a system board 110, a baseboard management controller 112, a digital signature 114, configuration settings 116, at least one central processing unit 130, and a memory module 132. Computing device 200 also includes a latch trigger mechanism 220, health information 222, a field replaceable unit 224, a bus 240 with one or more bus devices 242, a controller hub 252, and one or more application specific integrated circuit (ASIC) 254.
  • In some examples, the BMC 112 can be used to implement services for the computing device 100, 200. BMC 112 can be implemented using a separate processor from the central processing unit(s) (CPUs) 130 that is used to execute a high level operating system. BMCs can provide so-called “lights-out” functionality for computing devices. The lights out functionality may allow a user, such as a systems administrator, to perform management operations on the computing device 100, 200 even if an operating system is not installed or not functional on the computing device 100, 200. Moreover, in one example, the BMC 112 can run on auxiliary power, thus the computing device 100, 200 need not be powered on to an on state where control of the computing device 100, 200 is handed over to an operating system after boot. As examples, the BMC 112 may provide so-called “out-of-band” services, such as remote console access, remote reboot and power management functionality, monitoring health of the system, access to system logs, and the like. As used herein, a BMC 112 has management capabilities for sub-systems of a computing device 100, 200, and is separate from the CPU 130 that executes a main operating system of a computing device (e.g., a server or set of servers).
  • As noted, in some instances, the BMC 112 may enable lights-out management of the computing device 100, 200, which provides remote management access (e.g., system console access) regardless of whether the computing device 100, 200 is powered on, whether a primary network subsystem hardware is functioning, or whether an OS is operating or even installed. The BMC 112 may comprise an interface, such as a network interface, and/or serial interface that an administrator can use to remotely communicate with the BMC 112. As used herein, an “out-of-band” service is a service provided by the BMC 112 via a dedicated management channel (e.g., the network interface or serial interface) and is available whether the computing device 100, 200 is in powered on state.
  • In some examples, a BMC 112 may be included as part of an enclosure. In other examples, a BMC 112 may be included in one or more of the servers (e.g., as part of the management subsystem of the server) or connected via an interface (e.g., a peripheral interface). In some examples, sensors associated with the BMC 112 can measure internal physical variables such as humidity, temperature, power supply voltage, communications parameters, fan speeds, operating system functions, or the like. In other examples, the BMC 112 can collect and store log information, for example, log information associated with health of the computing device 100. The BMC 112 may also be capable to reboot or power cycle the device. As noted, the BMC 112 allows for remote management of the device, as such, notifications can be made to a centralized station using the BMC 112 and passwords or other user entry can be implemented via the BMC 112.
  • The Operating System is a system software that manages computer hardware and software resources and provides common services for computer programs. The OS can be executable on CPU 130 and loaded to memory modules 132. The OS is a high level OS such as LINUX, WINDOWS, UNIX, a bare metal hypervisor, or other similar high level software that a boot firmware engine of the computing device 100, 200 turns control of the computing device 100, 200 to.
  • In one example, an entity initiates putting the computing device 100, 200 into an intrusion detection mode in which an inventory of the computer system is taken by the BMC 112 to create a digital signature. The BMC 112 can activate the intrusion detection mode. During activation of the intrusion detection mode, a first digital signature is calculated of the hardware devices, one or more configuration settings 116 of the computing device 100, 200, at least one firmware version of firmware of the computing device 100, 200, combinations thereof, etc.
  • As used herein, the system board 110 is the main printed circuit board used for the computing device 100, 200 and allows communication between many of the components of the computing device, for example, the CPU 130, the memory module 132, peripherals, bus devices 242, etc. A number of hardware devices can be coupled to the system board 110. In some examples, a controller hub 252 can be an I/O controller hub, for example a southbridge. The controller hub may be used to manage data communications between a CPU 130 and other components of the system board 110. In some examples, a controller hub 252 may have direct media interface to a northbridge device or the CPU. Further the controller hub 252 may provide peripheral support for the computing device 200, such as bus connections like Universal Serial Bus (USB), Peripheral Component Interconnect (PCI), PCI express, PCI extended, serial AT attachment, audio circuitry, integrated Ethernet, enhanced host controller interfaces, combinations thereof, etc.
  • Examples of devices or components of the computing device 200 include bus devices 242 on one or multiple bus 240 (e.g., a PCIe bus), field replaceable units, a northbridge device, other ASICs 254, etc. As used herein, a field replaceable unit is a circuit board, part, or assembly that can be easily removed from a computing device 200 and replaced by a user or technician without having to send the whole computing device to a repair facility. Examples of FRUs include parts that can attach to other parts of the computing device 200 using a socket, a card, a module, etc. Further, examples of FRUs can include computing modules, memory modules, peripheral cards and devices, etc. In some examples, the system logs can include registers that provide particular information (e.g., an error flag for a particular component, a type of error, a current configuration, a location associated with an error, etc.). FRUs may include one or multiple unique identifiers (e.g., a serial number).
  • As used herein a memory module 132 is a component that can store information. The memory module 132 can be volatile or non-volatile. Further, the memory module 132 may be addressable by a central processing unit 130 of the computing device 100, 200. An example of a memory module 132 includes a DIMM.
  • In one example, the BMC 112 can interrogate (e.g., send a query and receive a response) to and from each of the components (e.g., hardware devices, firmware versions, configuration settings, etc.) to be inventoried. This may be performed by a particular sequence to ensure that each hardware device is detected and inventoried. In some examples, one or more bus 240 on the computing device 100, 200 can be searched for components and then the components can be inventoried. As used herein, a bus 240 is a communication system that transfers data between components inside the computing device 100, 200. Buses can include a PCIe bus, a memory bus, a universal serial bus, etc. Moreover, in some examples, other microcontrollers or firmware (e.g., platform firmware such as a basic input output system (BIOS)) can be used to detect and inventory hardware devices coupled to the computing device 200. For example, the BMC 112 can request part or all of the inventory to be taken by the BIOS or other controller.
  • In some examples, a bus device 242 can be included in a bus 240. As used herein, a peripheral device is a component that is not part of the essential computer (e.g., a main memory or central processing unit). An example of a peripheral device on a bus is a PCIe integrated network card or a PCIe graphics accelerator. In some examples, the BMC 112 is not directly connected to the hardware device to be interrogated and another component (e.g., the controller hub 252) and/or one or more bus can act as an intermediary between the BMC 112 and the hardware devices.
  • In some examples, the configuration settings can include values for all security settings, hardware enabled, hardware speed settings, voltage settings, license settings, etc. In other examples, the configuration settings inventoried can include a subset of configuration settings 116 that would normally not change between boots or with usage. In some examples, the inventory may also include at least one firmware version identifier for one or multiple firmware implemented on the computing device 200. A firmware version identifier can be an identifier of a version of the firmware being implemented on a particular component or a digital signature of an installed and approved firmware. This can protect from a malicious entity attempting to downgrade firmware to circumvent protections.
  • In some examples, the inventory can include one or more unique identifiers (e.g., serial numbers) of the respective components. In other examples, the inventory can include other static information about the component. A data structure can be used to incorporate the inventory. The first digital signature can be created for the inventory that is taken. A digital signature is a mathematical approach for demonstrating the authenticity of a digital message or document (e.g., the inventory). A modern cryptographic protocol suite can be used to calculate the signature from the inventory. The BMC 112 can cause storage of the digital signature. Further, in some examples, the BMC 112 can cause storage of the inventory. The storage can be in a non-volatile memory. Thus, the BMC 112 can store the digital signature and/or inventory in a non-volatile memory. Moreover, in some examples, the memory can be secure, for example, in a location only the BMC 112 can access, in a trusted platform module, or the like.
  • In some examples, the digital signature and/or inventory can be stored on a remote server as well. In one example, the information can be tied to a user account. Further, a unique identifier (e.g., a serial number) associated with the computing device 200 can be used to index the information. As such, the remote server can be a location that the BMC 112 stores the digital signature.
  • In some examples, security actions can be configured and customized as further detailed below. In some examples, security action may be pre-determined, in other examples, the security action may be customized as part of the activation of the intrusion detection mode. When the activation of the intrusion detection mode is complete, the BMC 112 can be set to monitor events that can help identify intrusions. Further, smart alerts can be sent to a user based on the monitoring. In some examples, the BMC 112 can record historical information, for example, take an inventory and store a digital signature on each boot of the computing device 200.
  • The BMC 112 detects a trigger during monitoring. In one example, the BMC 112 can react to a latch trigger mechanism 220 being triggered. A latch trigger can include a switch or other circuit that can be triggered when the computing device is opened. In another example, a custom intrusion trigger indicative of opening of the computing device 200 can be used. In one example, the intrusion trigger can be a detection of an adverse time condition. For example, if a time value of the computing device 200 is reset or unexpectedly changes (e.g., because of removal of a battery), this can be a trigger indicative of a possible physical intrusion. In another example, particular alterations to the configuration (e.g., a missing or disabled FRU, particular security settings, etc.) can be used as an intrusion trigger. In further examples, a trigger can be periodic or in response to an event, such as boot of the system. Because the BMC 112 can operate even while the computing device 200 is not fully powered on, the process may be implemented out of band, for example, allowing for the system to power on but not boot past a certain level to enable searching for hardware and configuration changes, but not booting to an operating system.
  • In one example, upon detection of a trigger, the BMC 112 can calculate a second digital signature of currently detected hardware devices, configuration settings, and firmware. As used herein, the term “currently detected” refers to the hardware devices, configuration settings, and firmware detected on the computing device 200 in response to the trigger. As noted, the approach used to search for the devices, configuration settings, and firmware versions that are detected can correspond to the approach above used for detecting hardware devices.
  • The BMC 112 can compare the first digital signature with the second digital signature. In one example, if the two digital signatures match, a first security action can be taken and if the signatures do not match a second security action can be taken.
  • In one example, the signatures match, which would indicate that there was an anomaly detected, but there is a high confidence that there was no change in the system. As such, a notification can be sent to a user (e.g., via a log message, an email, a management system, on screen, etc.) identifying the trigger and that there was no change found.
  • In another example, the signatures do not match. In this example, a notification can be sent identifying the trigger and that there was a change. In one example, the BMC 112 can further compare the inventories to determine a change between the two signatures. The change can be identified in the notification.
  • In one example, the change can occur in a FRU. In the example, a priority can be associated with the notification. For example, health monitoring aspects of the BMC 112 can identify that there is an error condition associated with the FRU. The BMC 112 can determine that the change included replacement of the FRU (e.g., identified by a change in serial number). The priority of the notification sent can be determined based on the health status. For example, an unknown change or a change not related to a health status can have a higher alert priority than a replacement of a FRU what has a health issue (e.g., a logged error condition).
  • Further, an amount of time that the computing device 200 was not in operation when the FRU was replaced can be used to adjust the priority. For example, acceptable maintenance time parameters can be kept in a data structure (e.g., a table). If the down time for the computing device 200 time parameters is not within the parameters, it can indicate that there was a possible malicious intrusion and the notification can be associated with a higher alert priority.
  • In another example, the BMC 112 can operate the intrusion detection mode in a lockdown mode. In the lockdown mode, a user would be required to authenticate via a system to prove that the user have authorization to continue with a boot process for the computing device 200 when a comparison indicates that an intrusion occurred. In one example, the user may be required to furnish a password or token via a remote server that had originally stored the first digital signature. In some examples, the password or token can be based on the first digital signature (e.g., derived from the first digital signature or used as a parameter for determining the password or token using a cryptographic suite).
  • In some examples, the computing devices 100, 200 can also include Input/Output interfaces, which may be used to communicate with other devices, for example, via a network, provide audible information, provide visual information, etc. The input/output interfaces may also be used to implement other input/output, for example, storage functionality (e.g., access to one or multiple storage arrays).
  • In one example, the BMC 112 may be associated with a secure storage, a hardware root of trust, or other security features. In one example, on initial boot of the computing device 200 into a service operating system (OS) or provisioning engine in a factory, a unique private and public key are generated and ‘glued’ onto the system by being saved into the BMC storage. This storage can be persistent and not replaceable. The BMC 112 may allow access to a key using an application programming interface. The values can be written to a write once register on a same Application Specific Integrated Circuit (ASIC) as the BMC. The write once register can be implemented, for example, using fuses. In one example, the private key is created by executing an algorithm using random sources and is programmed. In another example, the public key is a cryptographic hash of the private key. In some examples, once programmed, the ability to change the registers is disabled (e.g., severing a fuseable link, for example, on a write line). In some examples, the BMC 112 can be used to ensure that firmware of the computing device 200 is secure (e.g., by ensuring that firmware is not updated unless it is signed or encrypted using a public key that the private key of the BMC 112 can decrypt. Further, in some examples, the BMC 112 can stop the computing device 200 from booting with compromised firmware.
  • The computing device 200 may include a processing element that may be one or multiple central processing unit (CPU) or a combination of a CPU and other components such as a graphics processing unit (GPU), or microprocessor suitable for retrieval and execution of instructions and/or electronic circuits configured to perform the functionality described herein. In some examples, a firmware engine corresponding to platform firmware such as a BIOS may be implemented as a series of instructions encoded on a machine-readable storage medium of computing device 100, 200 and executable by CPU 130.
  • In some examples, a silicon root-of-trust feature supported by the computing device is used to ensure that the firmware on the computing device 100, 200 is not compromised. The silicon root-of-trust ensures that the BIOS and BMC Firmware cannot be replaced with non-authentic BIOS and BMC Firmware even with physical access to the system.
  • A communication network can use wired communications, wireless communications, or combinations thereof. Further, the communication network can include multiple sub communication networks such as data networks, wireless networks, telephony networks, etc. Such networks can include, for example, a public data network such as the Internet, local area networks (LANs), wide area networks (WANs), metropolitan area networks (MANs), cable networks, fiber optic networks, combinations thereof, or the like. In certain examples, wireless networks may include cellular networks, satellite communications, wireless LANs, etc. Further, the communication network can be in the form of a direct network link between devices. Various communications structures and infrastructure can be utilized to implement the communication network(s). Computing devices can connect to other devices using the communication network.
  • By way of example, devices communicate with each other and other components with access to the communication network via a communication protocol or multiple protocols. A protocol can be a set of rules that defines how nodes of the communication network interact with other nodes. Further, communications between network nodes can be implemented by exchanging discrete packets of data or sending messages. Packets can include header information associated with a protocol (e.g., information on the location of the network node(s) to contact) as well as payload information.
  • FIG. 3 is a flowchart of a method for performing a security action based on a comparison of digital signatures of hardware devices of a device, according to an example. FIG. 4 is a block diagram of a device with a baseboard management controller capable of executing a method to perform a security action based on a comparison of digital signatures of hardware devices of a device, according to an example.
  • The device 400 includes, for example, a BMC 410, and a machine-readable storage medium 420 including instructions 422, 424, 426, 428 for performing a security action based on a comparison of inventories. Device 400 may be, for example, a server, a notebook computer, a slate computing device, or any other computing device capable of performing the features described herein.
  • In certain examples, BMC 410 may be separate from a central processing unit (CPU) used to execute a high level OS of the device. The BMC 410 can be a physical device. BMC 410 may fetch, decode, and execute instructions 422, 424, 426, 428 to implement method 300. As an alternative or in addition to retrieving and executing instructions, BMC 410 may include at least one integrated circuit (IC), other control logic, other electronic circuits, or combinations thereof that include a number of electronic components for performing the functionality of instructions 422, 424, 426, 428.
  • Machine-readable storage medium 420 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable instructions. Thus, machine-readable storage medium may be, for example, Random Access Memory (RAM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a storage drive, non-volatile memory, a flash device, and the like. As such, the machine-readable storage medium can be non-transitory. As described in detail herein, machine-readable storage medium 420 may be encoded with a series of executable instructions for performing method 300.
  • Although execution of method 300 is described below with reference to device 400, other suitable components for execution of method 300 can be utilized (e.g., computing device 100, 200). Method 300 may be implemented in the form of executable instructions stored on a machine-readable storage medium, such as storage medium 420, and/or in the form of electronic circuitry.
  • The device 400 can be in a mode where it can take input. The input can be used by the BMC 410 to activate an intrusion detection mode (e.g., a secure mode, a transit mode, a rest mode, etc.). As part of implementation of the mode, at 302, BMC 410 can execute mode instructions 422 to enable the mode.
  • At 304, signature instructions 424 are executed to inventory the device 400 and calculate a digital signature as detailed above. The device 400 can include a number of hardware devices coupled to a system board, for example, one or more memory module, one or more CPU, one or more FRUs, etc. The inventory can be based on a number of unique identifiers associated with particular hardware devices of the device 400, the system board, etc. For example, at least one unique identifier can be associated with each main memory module installed on the device, each processor installed on the device, the system board of the device, each of a number of bus devices in a bus of the device, combinations thereof, etc.
  • Further, as noted above, the inventory can be based on one or multiple configuration settings. Moreover, in some examples, version information about one or multiple firmware implemented on the device can be included in the inventory. At 306, the digital signature is caused to be stored. In one example, the digital signature is stored in a non-volatile memory of the device. In another example, the digital signature can be caused to be stored in a remote server. As noted above, in some examples, the inventory can be stored as well.
  • Once the mode is enabled, the BMC 410 can be used to monitor the device to determine whether a trigger as described above occurs by executing trigger instructions 426. At 308, the BMC 410 calculates a second digital signature of the device 400. The second digital signature can be based on an inventory of the current hardware devices, configuration settings, and firmware versions of the device. The inventory can include looking for the same information sought out in original process used to calculate the digital signature.
  • At 310, signature instructions 424 can be used to compare the first and second digital signature. In some examples, the first digital signature is locally stored, in others the first digital signature is stored at the remote server and retrieved. In some examples, the retrieval process can include signing into an account that is tied to the device. At 312, security action instructions 428 can be executed to perform a security action based on the comparison.
  • In one example, the intrusion detection mode has a smart notification setting. In this mode, when the comparison detects a change, the inventory can also be compared. The inventory comparison can determine a change in the computing device between the signatures. In the example, the BMC 410 can output a notification (e.g., via a log, a display, an email, etc.) including information about the change. As detailed above, the notification can be associated with a priority and the priority can be modified based on health information about the device and/or maintenance information associated with a replacement of an FRU.
  • In another example, the intrusion detection mode can implement a lockdown mode. In this example, the trigger can be power on of the device 400 to a boot process. The BMC 410 can authenticate a user to ensure that the user has authorization to continue to the boot process for the computing device when the comparison is indicative of an intrusion prior to allowing the device to boot to an operating system. In a further example, a remote server can store information to authenticate the user. For example, a user can have an account that is linked to the device. In one example, the link can occur or be confirmed at the time of activation of the intrusion detection mode. As described above, a password or token from the account can be used to unlock the computing device and allow the boot process to complete and boot to the operating system.
  • While certain implementations have been shown and described above, various changes in form and details may be made. For example, some features that have been described in relation to one implementation and/or process can be related to other implementations. In other words, processes, features, components, and/or properties described in relation to one implementation can be useful in other implementations. Furthermore, it should be appreciated that the systems and methods described herein can include various combinations and/or sub-combinations of the components and/or features of the different implementations described. Thus, features described with reference to one or more implementations can be combined with other implementations described herein.

Claims (18)

1.-20. (canceled)
21. A computing device comprising:
a system board;
a plurality of hardware devices coupled to the system board, wherein the plurality of hardware devices includes at least one memory module, at least one central processing unit, and at least one baseboard management controller separate from the central processing unit,
wherein the baseboard management controller is to:
activate an intrusion detection mode;
during activation of the intrusion detection mode, calculate a first digital signature of the hardware devices, a plurality of configurations settings of the computing device, and at least one firmware version of the computing device;
cause storage of the first digital signature;
in response to a trigger, calculate a second digital signature of a plurality of currently detected hardware devices of the computing device, a plurality of currently detected configuration settings of the computing device, and at least one current firmware version of the computing device; and
perform a security action in response to the second digital signature not matching the first digital signature.
22. The computing device of claim 21, wherein the trigger is at least one of: a latch detection and an adverse time condition.
23. The computing device of claim 21, wherein the baseboard management controller is further to:
authenticate a user with authorization to continue a boot process for the computing device when the comparison is indicative of an intrusion prior to allowing the computing device to boot to an operating system.
24. The computing device of claim 23, the authentication includes a password based on the first digital signature.
25. The computing device of claim 21, wherein the baseboard management controller is further to:
store the first digital signature at the time of activation of the intrusion detection mode to a remote server; and
retrieve the first digital signature from the remote server for the comparison.
26. The computing device of claim 21, wherein the baseboard management controller is further to store a digital signature taken at each boot of the computing device.
27. The computing device of claim 21, wherein the first digital signature is based on at least a plurality of corresponding unique identifiers of the hardware devices.
28. A non-transitory machine-readable storage medium storing instructions that, if executed by a baseboard management controller of a device, cause the baseboard management controller to:
activate an intrusion detection mode,
wherein the baseboard management controller is separate from at least one central processing unit of the device, and
wherein the device includes a plurality of hardware devices coupled to a system board, wherein the plurality of hardware devices includes at least one memory module, the at least one central processing unit;
during activation of the intrusion detection mode, calculate a first digital signature of the hardware devices, a plurality of configurations settings of the computing device, and at least one firmware version of the computing device;
cause storage of the first digital signature;
in response to a trigger, calculate a second digital signature of a plurality of currently detected hardware devices of the computing device, a plurality of currently detected configuration settings of the computing device, and at least one current firmware version of the computing device; and
perform a security action in response to the second digital signature not matching the first digital signature.
29. The non-transitory machine-readable storage medium of claim 28, wherein the intrusion trigger is at least one of: a latch detection and an adverse time condition.
30. The non-transitory machine-readable storage medium of claim 28, wherein the baseboard management controller is further to:
determine a change in the computing device between the first digital signature and the second digital signature; and
output a notification including the change.
31. The non-transitory machine-readable storage medium of claim 28, wherein the baseboard management controller is further to:
authenticate a user with authorization to continue a boot process for the computing device when the comparison is indicative of an intrusion prior to allowing the device to boot to an operating system.
32. The non-transitory machine-readable storage medium of claim 28, wherein the baseboard management controller is further to:
retrieve the first digital signature from a remote server for the comparison.
33. The non-transitory machine-readable storage medium of claim 28, wherein the first digital signature is based on at least a plurality of corresponding unique identifiers of the hardware devices and firmware configuration information.
34. A method comprising:
activating an intrusion detection mode by a baseboard management controller of a device,
wherein the baseboard management controller is separate from at least one central processing unit of the device, and
wherein the device includes a plurality of hardware devices coupled to a system board, wherein the plurality of hardware devices includes at least one memory module, the at least one central processing unit;
during activation of the intrusion detection mode, calculating a first digital signature of the hardware devices based on respective unique identifiers associated with the hardware devices, a plurality of configurations settings of the computing device, and at least one firmware version of the computing device;
causing storage of the first digital signature;
in response to a trigger, calculating a second digital signature of a plurality of currently detected hardware devices of the computing device, a plurality of currently detected configuration settings of the computing device, and at least one current firmware version of the computing device; and
performing a security action in response to the second digital signature not matching the first digital signature.
35. The method of claim 34, further comprising:
determining, by the baseboard management controller, a change in the computing device between the first digital signature and the second digital signature; and
outputting a notification including the change.
36. The method of claim 34, further comprising:
authenticating, by the baseboard management controller, a user with authorization to continue a boot process for the computing device when the comparison is indicative of an intrusion prior to allowing the computing device to boot to an operating system.
37. The method of claim 34, further comprising:
storing the first digital signature at the time of activation of the intrusion detection mode to a remote server;
retrieving the first digital signature from the remote server for the comparison.
US16/904,045 2018-01-30 2020-06-17 Baseboard management controller to perform security action based on digital signature comparison in response to trigger Pending US20200320193A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/904,045 US20200320193A1 (en) 2018-01-30 2020-06-17 Baseboard management controller to perform security action based on digital signature comparison in response to trigger

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/883,519 US10719604B2 (en) 2018-01-30 2018-01-30 Baseboard management controller to perform security action based on digital signature comparison in response to trigger
US16/904,045 US20200320193A1 (en) 2018-01-30 2020-06-17 Baseboard management controller to perform security action based on digital signature comparison in response to trigger

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/883,519 Continuation US10719604B2 (en) 2018-01-30 2018-01-30 Baseboard management controller to perform security action based on digital signature comparison in response to trigger

Publications (1)

Publication Number Publication Date
US20200320193A1 true US20200320193A1 (en) 2020-10-08

Family

ID=67393484

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/883,519 Active 2038-08-26 US10719604B2 (en) 2018-01-30 2018-01-30 Baseboard management controller to perform security action based on digital signature comparison in response to trigger
US16/904,045 Pending US20200320193A1 (en) 2018-01-30 2020-06-17 Baseboard management controller to perform security action based on digital signature comparison in response to trigger

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US15/883,519 Active 2038-08-26 US10719604B2 (en) 2018-01-30 2018-01-30 Baseboard management controller to perform security action based on digital signature comparison in response to trigger

Country Status (1)

Country Link
US (2) US10719604B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202022102514U1 (en) 2022-05-07 2022-05-20 Tanweer ALAM Cryptography-based intelligent system for security management of microcode signatures
US11409918B1 (en) 2021-04-28 2022-08-09 International Business Machines Corporation Access control management of baseboard management controller peripherals

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10896266B1 (en) * 2018-07-12 2021-01-19 Amazon Technologies, Inc. Computer hardware attestation
US11068543B2 (en) * 2019-06-11 2021-07-20 Dell Products L.P. Component and object management of information handling systems
US11361067B2 (en) * 2019-08-29 2022-06-14 Mitac Computing Technology Corporation Cross authentication method for computer system security
US20210192450A1 (en) * 2019-12-20 2021-06-24 Gm Cruise Holdings Llc Real-time bill of materials for a vehicle
CN113626275A (en) * 2020-05-07 2021-11-09 捷普科技(上海)有限公司 Information establishing method and analyzing method
US11531760B1 (en) * 2020-11-25 2022-12-20 American Megatrends International, Llc Baseboard management controller (BMC)-based security processor
US20220327249A1 (en) * 2021-04-12 2022-10-13 Microsoft Technology Licensing, Llc Systems and methods for chassis intrusion detection
US11276284B1 (en) * 2021-04-13 2022-03-15 Honeywell International Inc. System and method for detecting events in a system
US11651110B2 (en) * 2021-07-08 2023-05-16 Dell Products, L.P. Hardware device mutual authentication system and method for a baseboard management controller (BMC)
US11921859B2 (en) * 2021-11-04 2024-03-05 Dell Products L.P. System and method for managing device security during startup

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6584565B1 (en) * 1997-07-15 2003-06-24 Hewlett-Packard Development Company, L.P. Method and apparatus for long term verification of digital signatures
US8266676B2 (en) * 2004-11-29 2012-09-11 Harris Corporation Method to verify the integrity of components on a trusted platform using integrity database services
US9037839B2 (en) * 2009-03-31 2015-05-19 Fujitsu Limited Secure startup of information processing apparatus including determining whether configuration information for hardware resources of the information processing apparatus have been modified
US9876645B1 (en) * 2015-02-17 2018-01-23 Amazon Technologies, Inc. Tamper detection for hardware devices
US10621351B2 (en) * 2016-11-01 2020-04-14 Raptor Engineering, LLC. Systems and methods for tamper-resistant verification of firmware with a trusted platform module
US10819719B2 (en) * 2016-10-11 2020-10-27 General Electric Company Systems and methods for protecting a physical asset against a threat

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030120918A1 (en) * 2001-12-21 2003-06-26 Intel Corporation Hard drive security for fast boot
US7403927B2 (en) * 2004-01-23 2008-07-22 Dell Products L.P. Method of manufacturing an item of build-to-order equipment
WO2006089352A1 (en) 2005-02-22 2006-08-31 United Electrical Software P/L Method and system for monitoring computer systems
US7735135B1 (en) 2005-08-31 2010-06-08 Juniper Networks, Inc. Hardware-based intrusion detection accelerator
US20090172639A1 (en) * 2007-12-27 2009-07-02 Mahesh Natu Firmware integrity verification
US20140200929A1 (en) * 2008-04-02 2014-07-17 Yougetitback Limited Systems and methods for dynamically assessing and mitigating risk of an insured entity
US8726407B2 (en) 2009-10-16 2014-05-13 Deviceauthority, Inc. Authentication of computing and communications hardware
US8995670B2 (en) 2011-04-29 2015-03-31 Dell Products L.P. Systems and methods for local and remote recording, monitoring, control and/or analysis of sounds generated in information handling system environments
US8683232B2 (en) * 2011-05-18 2014-03-25 Cpo Technologies Corporation Secure user/host authentication
US9225732B2 (en) 2011-11-29 2015-12-29 Georgia Tech Research Corporation Systems and methods for fingerprinting physical devices and device types based on network traffic
US9398039B2 (en) 2013-03-15 2016-07-19 Aruba Networks, Inc. Apparatus, system and method for suppressing erroneous reporting of attacks on a wireless network
US9870474B2 (en) * 2013-04-08 2018-01-16 Insyde Software Corp. Detection of secure variable alteration in a computing device equipped with unified extensible firmware interface (UEFI)-compliant firmware
US20140365780A1 (en) * 2013-06-07 2014-12-11 Safa Movassaghi System and methods for one-time password generation on a mobile computing device
US9396200B2 (en) 2013-09-11 2016-07-19 Dell Products, Lp Auto-snapshot manager analysis tool
US20180025344A1 (en) * 2016-07-25 2018-01-25 Ca, Inc. Communicating authentication information between mobile devices
US10586029B2 (en) * 2017-05-02 2020-03-10 Dell Products L.P. Information handling system multi-security system management

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6584565B1 (en) * 1997-07-15 2003-06-24 Hewlett-Packard Development Company, L.P. Method and apparatus for long term verification of digital signatures
US8266676B2 (en) * 2004-11-29 2012-09-11 Harris Corporation Method to verify the integrity of components on a trusted platform using integrity database services
US9037839B2 (en) * 2009-03-31 2015-05-19 Fujitsu Limited Secure startup of information processing apparatus including determining whether configuration information for hardware resources of the information processing apparatus have been modified
US9876645B1 (en) * 2015-02-17 2018-01-23 Amazon Technologies, Inc. Tamper detection for hardware devices
US10243747B2 (en) * 2015-02-17 2019-03-26 Amazon Technologies, Inc. Tamper detection for hardware devices
US10819719B2 (en) * 2016-10-11 2020-10-27 General Electric Company Systems and methods for protecting a physical asset against a threat
US10621351B2 (en) * 2016-11-01 2020-04-14 Raptor Engineering, LLC. Systems and methods for tamper-resistant verification of firmware with a trusted platform module

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11409918B1 (en) 2021-04-28 2022-08-09 International Business Machines Corporation Access control management of baseboard management controller peripherals
DE202022102514U1 (en) 2022-05-07 2022-05-20 Tanweer ALAM Cryptography-based intelligent system for security management of microcode signatures

Also Published As

Publication number Publication date
US20190236271A1 (en) 2019-08-01
US10719604B2 (en) 2020-07-21

Similar Documents

Publication Publication Date Title
US20200320193A1 (en) Baseboard management controller to perform security action based on digital signature comparison in response to trigger
US11520894B2 (en) Verifying controller code
US10740468B2 (en) Multiple roots of trust to verify integrity
US10956575B2 (en) Determine malware using firmware
US11030347B2 (en) Protect computing device using hash based on power event
EP3522059B1 (en) Perform security action based on inventory comparison
CN105122258B (en) Method, computing system and the article that system is configured
US11436324B2 (en) Monitoring parameters of controllers for unauthorized modification
CN107665308B (en) TPCM system for building and maintaining trusted operating environment and corresponding method
US9928367B2 (en) Runtime verification
US10181956B2 (en) Key revocation
CN116561826A (en) Managing use of management controller secrets based on firmware ownership history
CN113190880B (en) Determining whether to perform an action on a computing device based on analysis of endorsement information of a security co-processor
CN114692160A (en) Processing method and device for safe and trusted starting of computer
US11797679B2 (en) Trust verification system and method for a baseboard management controller (BMC)
CN116842517A (en) Trusted verification method and device
US11269637B2 (en) Validating machine-readable instructions using an iterative validation process
US11593490B2 (en) System and method for maintaining trusted execution in an untrusted computing environment using a secure communication channel
US20230342467A1 (en) Storage identity validation for a supply chain
CN112487500A (en) Authentication method

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SHIVANNA, SUHAS;REEL/FRAME:052966/0139

Effective date: 20180129

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCV Information on status: appeal procedure

Free format text: NOTICE OF APPEAL FILED

STCV Information on status: appeal procedure

Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER

STCV Information on status: appeal procedure

Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED

STCV Information on status: appeal procedure

Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

STCV Information on status: appeal procedure

Free format text: BOARD OF APPEALS DECISION RENDERED

STPP Information on status: patent application and granting procedure in general

Free format text: AMENDMENT / ARGUMENT AFTER BOARD OF APPEALS DECISION

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS